Level of User Security Behavior in the Service Industry
W. A. Al-khater, S. Member, S. A.- Ma, S. Member, K. Khan, and S. Member, “Comprehensive Review of Cybercrime Detection Techniques,” IEEE Access, vol. XX, 2020, doi: 10.1109/ACCESS.2020.3011259.
J. Brands and J. Van Doorn, “The measurement, intensity and determinants of fear of cybercrime: A systematic review,” Comput. Human Behav., vol. 127, p. 107082, 2022, doi: 10.1016/j.chb.2021.107082.
T. B. G. Herath, P. Khanna, and M. Ahmed, “Cybersecurity Practices for Social Media Users: A Systematic Literature Review,” J. Cybersecurity Priv., vol. 2, no. 1, pp. 1–18, Jan. 2022, doi: 10.3390/jcp2010001.
H. Oz, A. Aris, A. Levi, and A. S. Uluagac, “A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions,” ACM Comput. Surv., vol. 54, no. 11s, pp. 1–37, Jan. 2022, doi: 10.1145/3514229.
A. Chernikova et al., “Cyber Network Resilience Against Self-Propagating Malware Attacks,” in European Symposium on Research in Computer Security, Springer, 2022, pp. 531–550.
S. Kamil, H. S. A. Siti Norul, A. Firdaus, and O. L. Usman, “The Rise of Ransomware: A Review of Attacks, Detection Techniques, and Future Challenges,” in 2022 International Conference on Business Analytics for Technology and Security (ICBATS), Feb. 2022, pp. 1–7, doi: 10.1109/ICBATS54253.2022.9759000.
Y. Hong and S. Furnell, “Motivating Information Security Policy Compliance: Insights from Perceived Organizational Formalization,” J. Comput. Inf. Syst., vol. 62, no. 1, pp. 19–28, 2022, doi: 10.1080/08874417.2019.1683781.
H. Suryotrisongko and Y. Musashi, “Review of cybersecurity research topics, taxonomy and challenges: Interdisciplinary perspective,” Proc. - 2019 IEEE 12th Conf. Serv. Comput. Appl. SOCA 2019, pp. 162–167, 2019, doi: 10.1109/SOCA.2019.00031.
L. Sanny, V. Angelina, and B. B. Christian, “Innovation of SME service industry in Indonesia in improving customer satisfaction,” J. Sci. Technol. Policy Manag., vol. 12, no. 2, pp. 351–370, 2021, doi: 10.1108/JSTPM-03-2020-0056.
R. F. Ali, P. D. D. Dominic, S. Emad, A. Ali, and M. Rehman, “applied sciences Information Security Behavior and Information Security Policy Compliance : A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance,” Appl. Sci., 2021.
I. Metin-Orta and D. Demirtepe-Saygılı, “Cyberloafing behaviors among university students: Their relationships with positive and negative affect,” Curr. Psychol., no. 0123456789, 2021, doi: 10.1007/s12144-021-02374-3.
S. Toker and M. H. Baturay, “Factors affecting cyberloafing in computer laboratory teaching settings,” Int. J. Educ. Technol. High. Educ., vol. 18, no. 1, 2021, doi: 10.1186/s41239-021-00250-5.
S. Asongu, C. Meniago, and R. Salahodjaev, “The role of value added across economic sectors in modulating the effects of FDI on TFP and economic growth dynamics,” Int. J. Emerg. Mark., 2022, doi: 10.1108/IJOEM-10-2018-0547.
C. Chang, “Relational bonds , customer engagement , and service quality,” Serv. Ind. J., vol. 41, no. 321, pp. 330–354, 2021.
A. da Veiga, L. V. Astakhova, A. Botha, and M. Herselman, “Defining organisational information security culture—Perspectives from academia and industry,” Comput. Secur., vol. 92, p. 101713, 2020, doi: 10.1016/j.cose.2020.101713.
E. Ukwandu et al., “Cyber-Security Challenges in Aviation Industry: A Review of Current and Future Trends,” Inf., vol. 13, no. 3, pp. 1–22, 2022, doi: 10.3390/info13030146.
A. Wiley, A. McCormac, and D. Calic, “More than the individual: Examining the relationship between culture and Information Security Awareness,” Comput. Secur., vol. 88, 2020, doi: 10.1016/j.cose.2019.101640.
G. Carmi and D. Bouhnik, “The Effect of Rational Based Beliefs and Awareness on Employee Compliance with Information Security Procedures: A Case Study of a Financial Corporation in Israel,” Interdiscip. J. Information, Knowledge, Manag., vol. 15, pp. 109–125, 2020, doi: 10.28945/4596.
V. Hooper and C. Blunt, “Factors influencing the information security behaviour of IT employees,” Behav. Inf. Technol., vol. 39, no. 8, pp. 862–874, Aug. 2020, doi: 10.1080/0144929X.2019.1623322.
Z. Ahmad, T. S. Ong, T. H. Liew, and M. Norhashim, “Security monitoring and information security assurance behaviour among employees,” Inf. Comput. Secur., vol. 27, no. 2, pp. 165–188, Jun. 2019, doi: 10.1108/ICS-10-2017-0073.
M. Karjalainen, M. Siponen, and S. Sarker, “Toward a stage theory of the development of employees’ information security behavior,” Comput. Secur., vol. 93, p. 101782, Jun. 2020, doi: 10.1016/j.cose.2020.101782.
S. Barth, M. D. T. de Jong, M. Junger, P. H. Hartel, and J. C. Roppelt, “Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources,” Telemat. Informatics, vol. 41, pp. 55–69, Aug. 2019, doi: 10.1016/j.tele.2019.03.003.
J. Leach and J. Leach, “Improving user security behaviour,” Comput. Secur., vol. 22, no. 8, pp. 685–692, 2003.
L. Connolly, M. Lang, J. Gathegi, and J. D. Tygar, “The effect of organisational culture on employee security behaviour: A qualitative study,” Proc. 10th Int. Symp. Hum. Asp. Inf. Secur. Assur. HAISA 2016, no. March 2018, pp. 33–44, 2016.
M. J. Alotaibi, S. Furnell, and N. Clarke, “A framework for reporting and dealing with end-user security policy compliance,” Inf. Comput. Secur., vol. 27, no. 1, pp. 2–25, Mar. 2019, doi: 10.1108/ICS-12-2017-0097.
N. Sarhan, A. Harb, F. Shrafat, and M. Alhusban, “The effect of organizational culture on the organizational commitment: Evidence from hotel industry,” Manag. Sci. Lett., vol. 10, no. 1, pp. 183–196, 2020, doi: 10.5267/j.msl.2019.8.004.
G. Hofstede, “Culture’s Consequences:International Differences in Work-related Values,” Sage Publ. Thousand Oaks, 1980.
S. H. Schwartz, “Universal In The Content And Structure Of Values : Theoretical Advances And 20 Countries,” vol. 25, 1992.
S. Furnell, W. Khern-am-nuai, R. Esmael, W. Yang, and N. Li, “Enhancing security behaviour by supporting the user,” Comput. Secur., vol. 75, pp. 1–9, Jun. 2018, doi: 10.1016/j.cose.2018.01.016.
M. Rakhra, “Behaviour In Developing An Effective Anti-Phishing Educational Framework,” no. Icisc, pp. 832–836, 2018.
F. Foroughi and P. Luksch, “A Multi-agent Model for Security Awareness Driven by Home User’s Behaviours,” in Advances in Intelligent Systems and Computing, vol. 880, Springer International Publishing, 2019, pp. 185–195.
P. Uwayo, V. M. Nsanzumukiza, A. Maniragaba, A. P. Nsabimana, and V. Akimanizanye, “Contribution of Former Poachers for Wildlife Conservation in Rwanda Volcanoes National Park,” J. Geosci. Environ. Prot., vol. 08, no. 04, pp. 47–56, 2020, doi: 10.4236/gep.2020.84004.
D. McGartland Rubio, “Content Validity,” in Encyclopedia of Social Measurement, vol. 1, Elsevier, 2005, pp. 495–498.
S. A. Livingston, “Test Reliability-Basic Concepts,” 2018.
S. Giap, M. Ang, L. Anthony, and P. O. Brien, “Investigating the psychometric properties of the Carers ’ Fall Concern instrument to measure carers ’ concern for older people at risk of falling at home : A cross-sectional study,” no. August 2019, pp. 1–10, 2020, doi: 10.1111/opn.12338.
E. K. Titov and V. Y. Tsvetkov, “Accumulated reliability of information hardware and software systems,” IOP Conf. Ser. Mater. Sci. Eng., vol. 919, no. 2, p. 022055, Sep. 2020, doi: 10.1088/1757-899X/919/2/022055.
E. A. O. Zijlmans, J. Tijmstra, L. A. van der Ark, and K. Sijtsma, “Item-Score Reliability as a Selection Tool in Test Construction,” Front. Psychol., vol. 9, no. JAN, Jan. 2019, doi: 10.3389/fpsyg.2018.02298.
- There are currently no refbacks.
Published by INSIGHT - Indonesian Society for Knowledge and Human Development